SSL Authentication in Mongrel

I am working on project and I need to get the value stored in the
header
(SSL_CLIENT_S_DN_CN ). We have been doing PKI authentication for
sometime in PHP by getting the value of
$_SERVER["SSL_CLIENT_S_DN_CN"] .
Now that I am trying some stuff in Rails I can't seem to get
anywhere.
I try to do what you do above and I get a "Bad Request" when I have
SSLUserName SSL_CLIENT_S_DN_CN in the httpd-ssl.conf file. I am able
to get up and running when I comment it out.

Here is my config:

SSLRandomSeed startup builtin
SSLRandomSeed connect builtin
SSLRandomSeed connect file:/dev/urandom 512
Listen 443
AddType application/x-x509-ca-cert .crt
AddType application/x-pkcs7-crl .crl
SSLPassPhraseDialog builtin
SSLSessionCache "shmcb:/var/run/ssl_scache(512000)"
SSLSessionCacheTimeout 28800
SSLMutex "file:/var/run/ssl_mutex"
<VirtualHost *:443>
<Proxy balancer://mongrel_cluster>
BalancerMember http://127.0.0.1:3000
</Proxy>
# General setup for the virtual host
ServerName luther.example.com
ServerAdmin r...@example.com
ErrorLog "/var/log/httpd-error.log"
TransferLog "/var/log/httpd-access.log"
RequestHeader set X_FORWARDED_PROTO 'https'
SSLUserName SSL_CLIENT_S_DN_CN
ProxyPass / balancer://mongrel_cluster/
ProxyPassReverse / balancer://mongrel_cluster/
ProxyPreserveHost ON
#Rewrite the REMOTE_USER env variable into the request header
RewriteEngine On
RewriteCond %{LA-U:REMOTE_USER} (.+)
RewriteRule . -[E=RU:%1]
RequestHeader add X-FORWARDED-User %{RU}e
SSLEngine on
SSLCipherSuite
ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
SSLCertificateFile "/usr/local/etc/apache22/ssl/luther.crt"
SSLCertificateKeyFile "/usr/local/etc/apache22/ssl/privkey.pem"
SSLCertificateChainFile "/usr/local/etc/apache22/ssl/chain.crt"
SSLCACertificatePath "/usr/local/etc/apache22/ssl.crt"
SSLVerifyClient require
SSLVerifyDepth 10
SSLOptions +StdEnvVars +ExportCertData
</VirtualHost>
And in an controller I am just doing:
<p><%= request.env['SSL_CLIENT_S_DN_CN'] %></p>
also tried
<%= request.env['HTTP-X-FORWARDED-SSL_CLIENT_S_DN_CN'] %>

All I get is blank.

Any advice would be MUCH appreciated

As a "quick and nasty, see what the hell is happening" thing, I would
put the following in your view:

<pre>
<%= session.to_yaml -%>
</pre>

That way you can see what the session actually contains and debug from there.

Mikel

Fantastic! ... I did that and was able to see that I was calling it
wrong!

I was <%= request.env['HTTP-X-FORWARDED-SSL_CLIENT_S_DN_CN'] %>

and all I needed was <%=
request.env['HTTP_X_FORWARDED_SSL_CLIENT_S_DN_CN'] %>

This is great news thanks for all your help.

Good! :slight_smile:

That is a bit of a hackish way to do it though (putting it in the
view). A better solution is making an around filter and then
requesting it.

Like here:

http://www.lindsaar.net/2008/3/17/debugging-the-rails-session-store

Mikel
http://lindsaar.net/